[HTML][HTML] Realizing quantum-safe information sharing: Implementation and adoption challenges and policy recommendations for quantum-safe transitions

I Kong, M Janssen, N Bharosa - Government Information Quarterly, 2024 - Elsevier
By utilizing the properties of quantum mechanics, quantum computers have the potential to
factor a key pair of a large prime number and break some of the core cryptographic …

[HTML][HTML] Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

G Fitzgibbon, C Ottaviani - Cryptography, 2024 - mdpi.com
Advances in quantum computers may pose a significant threat to existing public-key
encryption methods, which are crucial to the current infrastructure of cyber security. Both …

A Selection Technique for Effective Utilization of Post-Quantum Cryptography in 5G Application and Beyond

B Ojetunde, T Kurihara, K Yano… - … on Computer and …, 2023 - ieeexplore.ieee.org
In the quantum computing era, classical cryptography algorithms are expected to be unsafe.
To provide a solution to the problem that may occur to this effect, Post-Quantum …

ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era

D Sikeridis, D Ott, S Huntley, S Sharma… - Cryptology ePrint …, 2023 - eprint.iacr.org
Given the importance of cryptography to modern security and privacy solutions, it is
surprising how little attention has been given to the problem of\textit {cryptographic agility} …

[HTML][HTML] Perfect Reconciliation in Quantum Key Distribution with Order-Two Frames

LA Lizama-Pérez, JM López-Romero - Symmetry, 2021 - mdpi.com
We present an error reconciliation method for Quantum Key Distribution (QKD) that corrects
100% of errors generated in regular binary frames transmitted over a noisy quantum …

[PDF][PDF] Quantum safe authentication of quantum key distribution protocol

A Lintulampi - University of Helsinki, 2023 - helda.helsinki.fi
Modern web services produce massive amounts of data. In order to derive meaningful
knowledge from the bulk data, web service providers use methods of data science and …